We all know about PING (Packet INternet Groper) command, right? Yeah, it is used to verify a host can able to communicate over the Network with another Computer or Network devices. Using Ping command, we...

Ever wondered how many Linux Kernels you have installed in your Linux box? No? Well, this brief tutorial will teach you how to view or check installed Linux Kernels on different Linux operating systems. It’s...

Even though Linux is secure by design, there are many chances for the security breach. One of them is weak passwords. As a System administrator, you must provide a strong password for the users. Because,...